Model construction on prefix hijacking attack | IEEE Conference Publication | IEEE Xplore